IT chapters 13-14
Sends data packets between computer networks and is generally used for internet applications
Router
What is a WAN?
Wide Area Network
Best way to keep to keep a network secure
Implement all of the available safety precautions
___ provides the interface between the network and the computer
Network adapter
A network-transmission device that checks and forwards packets between parts of the network
Switch
The correct pair of starting and ending tags for defining a hyperlink
<html> ... </html>
What is an isp
A company that provides access to the internet
What is required to provide database support to a web page
A preprocessor
Usually a separate file referenced by each page in a website to control formatting
A style sheet
What refers o the correctness of the results from a web search
Accuracy
A continuous signal that can vary over an infinite range
Analog
The Boolean operators used to create precise search strings
And Or Not
What provides varying levels of access to information?
Authentication
Channel capacity is also referred to as
Bandwidth
The client software program that retrieves web documents and displays them
Browser
Which type of network is naturally unsecure?
Cabled
A triangle in the upper-left corner of a cell indicates
Cell has been modified while changes are being tracked
_____ May refer to either a computer on a network or the software it runs
Client
What are the two computers that communicate with each other on a network?
Client, server
The communication between the host and client is
Client-server relationship
Basic design principles such as ___ should be followed when designing for the web
Contrast, repetition, alignment, and proximity
The best approach to troubleshoot a network
Determine the exact nature of the mishap and then search for solutions
A signal composed of discrete chunks of data
Digital
The area of study to discuss and remedy excessive use of screen time, online and smartphone addictions
Digital wellness
What is an html tag
Element used to markup text
How does encryption provide network security?
Encodes a file
What is the study of the efficiency and safety of objects
Ergonomics
Is a data-transmission technology that creates a wired connection between modes or routers and computers
Ethernet
Used to describe the network of networks when remote devices or networks are connected
Extranet
T or F - any wireless device is capable of Bluetooth technology
False
T or F - clock speed of the local computer affects the internet connection
False
T or F - in html5, semantic tags' purpose is not always clear by name
False
Which technology is capable of high transmission rate?
Fiber optic cable
A cascading style sheet provides what for a web page
Formatting information
Markup language for formatting a web page
Html
Where is the interactive troubleshooter in Windows?
Help feature
Interactivity on a web page requires language
Higher than html
___ is the hub of the network
Host
Three levels of formatting provided by cascading style sheets are
Internal, external, in-line
Builds on the concept of the computing cloud to connect computers
Internet area network
A locally confined network of networks , usually within a single business or school
Intranet
What utility in windows can be used to find the IP address of the computer
Ipconfig.exe
A client side provider in a web page is
JavaScript
Languages often used to program interactivity
JavaScript and PHP
___ consists of a group of computers and their devices that are locally assembled in a limited area
Local area network LAN
An action on a website that causes the cursor to change to indicate a hyperlink
Mouse-over
___ model separates the functions of networking into layers that keep the same functions together for all networks
Open system interconnection OSI
A server side provider of interaction in a web page is
PHP hypertext preprocessor
Information on the internet and www is transmitted in
Packets
Basic network security includes
Password protection, firewalls, levels of access, and encryption
Files can be shared among all devices without going through a host
Peer to peer topology
Which OSI layer contains the hardware?
Physical
What describes the shape of the network connections to the computers and devices?
Physical topology
What format must an html file take?
Plain text
Application or process specific software communication endpoints in a computer's operating system
Ports
Involves statement of the problem, gathering of information, formulation of a solution and action to resolve the problem
Problem solving
Makes use of packet switching to transfer information and is available to the general public
Public switched network
How does a firewall provide network security?
Regulates network traffic
Process of taking measurements along the apology signalto convert to a digital signal
Sampling
The Java script command that displays a pop-up box
Script alert
The device that connects computers in a network
Server
What makes a computer a server?
Specialized software
In html what are used to tell browsers how to format or display a web page
Tags
Validation of a web page can be accomplished via
The World Wide Web consortium website
When an error is made in html code,
The browser ignores it
Formatting is applied to cells so
The data is easier to understand
T or F - There are weakness in all wireless security algorithms and can be bypassed
True
T or F - Web 2.0 promotes the use of multimedia and social networking
True
The purpose of a scroll bar on a web page is
To allow the user to move quickly within a web page
___ is the number of bits per second that can be sent from one device to another
Transmission rate
What network connects smaller star topology networks via a bus topology
Tree
A method for ensuring the correctness in which the same information can be located in at least three different sources
Triangulation
An address that points to a specific document or other resource on the World Wide Web
URL
URL stands for
Uniform resource loader
What does the acronym VPN mean?
Virtual private network
What was the most recent algorithm introduced by the WiFi alliance to provide better security for wireless networks
WPA2
How does the World Wide Web relate to the Internet
Www is a subset of internet